Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 04:27

General

  • Target

    908645e248fc3da85b3fe02f96234820N.exe

  • Size

    83KB

  • MD5

    908645e248fc3da85b3fe02f96234820

  • SHA1

    509152f303dd26eecda946d6439eb5d2d7ce7a3c

  • SHA256

    b81ddf467b3b2d6ce17d8de45c3f6f4856787138fe2ce11e9831463d32aa418d

  • SHA512

    bf023ab608e50c7288f14470f691b6368afb8dc03db2d659a8098afe3ee2ab70ef5b9bc8964f930e1ab813394ece48c64b673392a15460cfc89f5d5e72844cf3

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\908645e248fc3da85b3fe02f96234820N.exe
    "C:\Users\Admin\AppData\Local\Temp\908645e248fc3da85b3fe02f96234820N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-tgME6Nc4e6ART9U6.exe

    Filesize

    83KB

    MD5

    c2375c358cce57eaa7935aba085d35cd

    SHA1

    4fd169c7bdf57ed8084339e16cf24c48e382fbbc

    SHA256

    673e2f8baddf97271e2a075f7ef80e842f4af5a563a57c5cbc5050010774abcc

    SHA512

    21cf3d38ee2f846518fe5ee21d8dd6be5109fc46b64e03ec9660cc519fb9e5a64740e234744e8655a7acbcdc016b213d76d445f5b836f191e73f3a3bd41cc0ba

  • memory/1964-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1964-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB